skip to main content

DEF CON 26 Hacking Conference

CONTESTS & EVENTS

CONTESTS & EVENTS

8th Defcon Bike Ride

Event
Friday: 0600

At 6am on Friday, the @cycle_override crew will be hosting the 8th Defcon Bikeride. We'll meet at a local bikeshop, get some rental bicycles, and about 7am will make the ride out to Red Rocks. It's about a 15 mile ride, all downhill on the return journey. So, if you are crazy enough to join us, get some water, and head over to cycleoverride.org for more info. See at 6am Friday! @jp_bourget @gdead @heidishmoo. Go to cycleoverride.org for more info.

More Info: https://twitter.com/cycle_override, http://cycleoverride.org

Back to top



AI Village Jeopardy

Contest | Location: AI Village
Friday: AI Village Hours

In a jeopardy style CTF, contestants (if we are provided the full space requested) will be able to compete and learn by working through our challenges categorized in groups such as “classification”, “clustering”, and “attacking machine learning models’. Participants will be provided a docker image will all datasets, questions (in IPython notebooks), and submission APIs needed to compete. Educational materials will be provided for initial (novice level) challenges to ensure that all contestants have a baseline understanding of the core concepts needed to compete.

More Info: @aivillage_dc, http://jeopardy-ctf.aivillage.org

Back to top



BadgeLife Contest

Contest | Location: Contest Floor
All Con

Badges have been around Defcon for years, and badge hacking happens every year! This year, let’s make it an official contest! Let’s award prizes! Let’s judge badges on originality, functionality, best counterfeit, and our personal favorite OMGWTFBBQ!

More Info: http://badgelife.org, @dcbadgelife

Back to top



CMD+CTRL

Contest | Location: Contest Floor
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00

CMD+CTRL is bringing two new vulnerable websites that participants will be competing to find vulnerabilities in. Vulnerabilities are automatically detected and award points when they're exploited. There are over 100 different vulnerabilities, including SQLi, XSS, password cracking, and more. Come put your red team skills to the test and compete to find the most web vulnerabilities!

There will be easy challenges and reference material for beginners, as well as a hardened application to challenge experienced hackers.

More Info: @cmdnctrl_defcon

Back to top



Coindroids

Contest | Location: Contest Floor
Friday - Sunday: Contest Floor Hours

The year is 20X5 and humanity has fallen: now there are only Coindroids. The machines we designed to manage our finances have supplanted and destroyed the human race by turning our own economy against us. Now they battle each other in the ruins of our fallen cities, driven by a single directive: money is power.

Battle your way to the top of the leaderboard by attacking rival droids, or assemble your hacker-fam and compete in the quest to infiltrate Imperial One.

New to cryptocurrencies? No DEFCOIN to play with? Not a problem! Just come visit our booth in the contest area and we can help get you started.

More Info: https://www.coindroids.com, @coindroids, https://www.facebook.com/Coindroid/

Back to top



CrackMeIfYouCan

Contest | Location: Contest Floor
Friday: 1000-2000, Saturday: 1000-2000, Sunday: 1000-1200

As a part of authorized penetration tests of companies' internal corporate networks and external websites, you have captured a large number of password hashes and some encrypted files of various types. You owned the firmware of some weird devices, and got hashes. You found corrupted backups with partial password hashes in them. You found password-protected ZIP and RAR files and you want to know whats inside. You were able to do a SQL injection, and extract the users' hashes from the database. But now, you have to crack all these hashes.

In it's 7th year, Crack Me If You Can (CMIYC) is the premiere password cracking contest. We challenge teams of the world's best password crackers. And force them to share their knowledge, tips, and tricks with the community. The challenges presented in the 2010 contest are now trivial and easily completed by even a novice password cracker. So, in 2018, we hope to introduce new challenges that will continue to push the boundaries of what is possible with password recovery.

The contest is geared in a way so that even beginner password crackers will get some points, and hopefully learn along the way.

Fire up your GTX 2080s and EC2 clusters. Ask your boss for time on that super computer your company has. Buy a CRAY on ebay. Email your college professor and ask for your account to be re-enabled on the cluster. Get a few extra box fans. You are going to need it all. Stop wasting your GPUs on playing Minecraft, there are passwords to crack!

More Info: https://contest.korelogic.com/, @crackmeifyoucan

Back to top



DEAF CON Meet Up

Event | Location: Chill Out Lounge
Saturday: 12:00

DEAF CON is a California 501 (c)(3) Non-profit organization. We provide outreach to the Deaf and HH community and information security community. We encourage Deaf and HH information security professionals to attend conferences, like Defcon. We help to provide communication services and spaces for professionals to meet and network with others. Anyone can come and attend our meet up and hangout!

More Info: https://www.deafconinc.org/, @_DEAFCON_

Back to top



Def Con 26 Creative Writing Short Story Contest

Contest | Location: The Internets

The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are sometimes overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

More Info: @dcshortstory

Back to top



DEF CON Beard and Moustache Contest

Contest | Location: Contest Stage
Friday: 1800-2000

Held every year since DEF CON 19 in 2011 (R.I.P. Riviera), the DEF CON Beard and Moustache Contest highlights the intersection of facial hair and hacker culture.

More Info: http://www.dcbeard.com/, @DCBeardContest

Back to top



DEF CON Blitz Chess Tournament

Contest | Location: Contest Stage
Saturday: 1800-2000

The first-ever DEF CON Chess Tournament, in Blitzkrieg format, in which there will be just 5 minutes on each player’s clock. During the tournament, each player will play every other player one time. A victory is 1 point, a draw 1/2, and a loss 0. At the end of the tournament, the player with the highest score wins the grand prize (tbd) and a trophy. In the event of a tie, there will be a sudden death playoff between the highest scorers to determine the champion.

Back to top



Defcon Ham Radio Fox Hunting Contest

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

In the world of amateur radio, groups of hams will often put together a transmitter hunt (also called "fox hunting") in order to hone their radio direction finding skills to locate one or more hidden radio transmitters broadcasting. The Defcon Fox Hunt will require participants to locate a number of hidden radio transmitters broadcasting at very low power which are hidden throughout the conference. Each transmitter will provide a clue to a larger puzzle, requiring participants to piece together the information broadcasted from each transmitter. Once they've decoded the final puzzle, they will be sent to find one final ultra low power transmitter broadcasting a passphrase which they will enter on a contest website and receive their trophy for completing the contest. A map with rough search areas will be given to participants to guide them on their hunt. Additional hints and tips will be provided throughout Defcon to help people who find themselves stuck.

More Info: http://defcon26foxhunt.com

Back to top



Defcon DarkNet

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

The DarkNet project is an online and in person game in which players interact with an chat bot that sends them on quests which teach as well as challenge them. Technical challenges related to hacking and security are the most prominent. Each quest line requires the players to work independently or together to solve puzzles, research ciphers, learn new technologies such as PGP or Tor in order to gain points and progress. Many, but not all, of our quests have an in-person component -- we have in the past had a lock picking challenge box at our table, an RFID reader challenge, and badge kits that are involved in making progress in certain parts of the game. We collaborate with other Events, Villages and Contests to share content and send people around DefCon to learn new things -- almost like a mini-DC101 program with a game around it. 

More Info: https://dcdark.net

Back to top



Drunk Hacker History

Contest | Location: Contest Stage
Saturday: Saturday night

One night only at DEF CON 26, Drunk Hacker History is back by popular demand for a 4th historic year! The past three years proved to the entire galaxy that in the game of intoxicated nostalgic recall, there are no losers and those who won, lost. The DEF CON community has a history of sorts. It is a history is filled with mephitic adventures, quarter-truths, poor life choices, incontinence, and various forms of C2H6O. This year, we will connect our stacks to extract some of the most celebrated, exaggerated and entertaining moments in Hacker History through the interpretation of a group of well-trained participants. In the end, we will, again, crown the Drunkest Hacker in History and you, the audience, will rejoice! Hosted by c7five & jaku, if you like eating from an 80s candy cannon, “Cats” the musical, and feats of strength, you won’t want to miss the return of Drunk Hacker History! Presented in DEF CON 4D and made possible by a grant from monkeyhelpers.org.

More Info: @DrunkHackerHist

Back to top



DEF CON Scavenger Hunt

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Do you have specialty skills that you haven't found an outlet for? Like making replicas of colonial era Presidents heads out of macaroni and cheese or stitching wool sweaters for Venus fly traps? Well as it turns out there's a competition made special just for you! Come on down to the Defcon Scavenger Hunt, now in its 21st year! We are the contest that you might not have known by name but you've probably seen, heard, or smelled all over Defcon. With competitions that involve you with almost every aspect of Defcon; we're arguably the best way you can spend your weekend. First through third place will receive fabulous prizes, while all other participants will presumably walk away with a little more dignity left.

More Info: http://defconscavhunt.com, @DefConScavHunt

Back to top



D(struction)20 CTF

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Contest Stage 12:00-14:00

Part CTF, part lemon race, part game show, part demolition derby, the D(struction)20 CTF is a contest to build an affordable, low-cost, usable, and powerful hacking platform, and compete with it! In order to compete in the D(struction)20 CTF, contestants must register their rig with proof that the total cost was less than $200. Periodically during the competition, a random contestant from the leaderboard will roll the d20 of Destruction to decide what will happen to their rig. If they're very lucky, they roll a natural 20 and no damage will be inflicted! Otherwise, the d20 of Destruction will decide what type of damage will be done to their rig, be it water spillage, physical impact, or something else! If the rig survives their chosen fate, the contestant may continue playing, but either way, rolling the d20 of Destruction results in a big point bonus that may make the difference between winning and losing, even if the rig is destroyed in the process!

Back to top



Dungeons@DEFCON

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00

A puzzling campaign for 1-4 players.

20 08 05 18 05 19 20 18 05
01 19 21 18 05 09 14 20 08
05 04 21 14 07 05 15 14 19
02 05 12 15 23 04 05 06 03
15 14 01 19 19 05 13 02 12
05 25 15 21 18 16 01 18 20
25 01 14 04 06 09 14 04 21
19

More Info:

Back to top



EFF Tech Trivia

Contest | Location: Contest Stage
Friday: 15:00-17:00

EFF's team of technology experts have crafted challenging trivia about the fascinating, obscure, and trivial aspects of digital security, online rights, and Internet culture. Competing teams will plumb the unfathomable depths of their knowledge, but only the champion hive mind will claim the First Place Tech Trivia Cup and EFF swag pack. The second and third place teams will also win great EFF gear.

More Info: @EFF, https://eff.org

Back to top



GEEKPWN

Event

Started by KEEN - and the first in 2014, GeekPwn enables security geeks around the world to exchange their thoughts and research findings. As the international intelligence security community, GeekPwn tries to create secure life with secure techniques. In GeekPwn, YOU are encouraged to exploit unknown vulnerabilities of the cyber world. And together, WE aim to help manufacturers develop their security systems and create a better world.

The most unique and extraordinary character of a GeekPwn attendee is his/her open-minding and rich variety of PWN.

Security researchers are welcomed to GeekPwn if they are able to take control or obtain data without authorization under reasonable, realistic conditions (without tampering, pre-implanted Trojans or certain pre-granted privileges), and target software and protocols of mobile phones, smart devices, Internet of Things, new I/O modules (gesture capture, VR, AR, etc.), AI-featured modules and services (robots, visual recognition and voice recognition), etc.

More Info: http://www.geekpwn.org

Back to top



The Gold Bug - Crypto & Privacy Village Puzzle

Contest | Location: Crypto & Privacy Village

Love puzzles? Need a place to exercise your classical and modern cryptography skills? This puzzle will keep you intrigued over the course of DEF CON. VF GUVF ERNY BE VF VG N TNZR?

More Info: http://goldbug.cryptovillage.org/

Back to top



Hack Fortress

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00

Teams of 10 (4 Hackers + 6 TF2 players) will compete to score more points than their opponents during each match. The goal is simple: score more points than your competitors. How you do that is where the challenge comes in. The TF2 players will be frantically trying to kill, capture and win rounds against the opposing TF2 players. At the same time, the hackers will be attempting to solve a variety of hacking challenges. As tasks are completed, credits in our ‘hackconomy’ are gained. These can be used to purchase effects to help your team or hinder your opponents in both hacking and TF2.

More Info: http://hackfortress.net, @tf2shmoo, hackfortresstv (twitch) /r/HackFortresshackfortress.net

Back to top



Hacker Karaoke

Event | Location: Emperors Chillout - Caesars
Friday: 20:00 - 2:00, Saturday: 20:00 - 2:00

Do you like to sing? Do you want to perform? Ever wanted to sing in front of others? Come on down to the 10th Annual Hacker Karaoke, DEFCON's on-site karaoke experience. You can be a star, or if you don't want to be a star, you can also take pride in making an utter fool of yourself.

More Info: https://hackerkaraoke.org/, @hackerkaraoke

Back to top



Hack the Plan[e]t

Contest | Location: ICS Village
Friday & Saturday:

Hack the Plan[e]t Capture the Flag (CTF) contest will feature GRIMM’s Howdy Neighbor and the Industrial Control System (ICS) Range. This first of its kind CTF will integrate both Internet of Things (IoT) and ICS environments with interactive components for competitors to test their skills and knowledge.

Howdy Neighbor is an interactive IoT CTF challenge where competitors can test their hacking skills and learn about common oversights made in development, configuration, and setup of IoT devices. Howdy Neighbor is a miniature home - made to be “smart” from basement to garage. It’s a test-bed for reverse engineering and hacking distinct consumer-focused smart devices, and to understand how the (in)security of individual devices can implicate the safety of your home or office, and ultimately your family or business. Within Howdy Neighbor there are over 18 emulated or real devices and over 40 vulnerabilities that have been staged as challenges. Each of the challenges are of varying levels to test a competitors ability to find vulnerabilities in an IoT environment. Howdy Neighbor’s challenges are composed of a real or simulated devices controlled by an App or Network interface and additional hardware sensors; each Howdy Neighbor device contains 1 to 3 staged vulnerabilities which when solved present a key for scoring/reporting that it was discovered.

In the same vein, this CTF challenge will also leverage the ICS Village’s ICS Range to provide an additional testbed for more advanced challenges in critical infrastructure and ICS environments.

More Info: https://www.icsvillage.com, @ICS_Village

Back to top



Spell Check: The Hacker Spelling Bee

Contest | Location: Contest Stage
Time: TBD (See Info Booth)

The year is 1983. Supplies and entertainment are both running low and the machines are closing in. Suddenly, a technical editor from the future appears with a security style guide from 2018 and challenges you to spell terms as they appear in the guide. Maybe this quaint ritual will warm the hearts of the robots and bring in a new era of understanding to this troubled world. You’re confident you can make it past “asset” and “botnet,“ but you get a sinking feeling that in later rounds, capitalization is going to count too. The odds are against you, but it’s the end of the world… you might as well go out in a blaze of glory.

More Info: https://www.bishopfox.com/blog/2018/02/hello-world-introducing-the-bishop-fox-cybersecurity-style-guide/

Back to top



Ham Radio Exams

Event | Location: Anzio, Caesars
Friday: 10:00-16:00, Saturday: 12:00-18:00

Take HAM Radio Exams at DEF CON 26!

Back to top



Laser Shooting Gallery

Event | Location: Venice, Caesars

Experience the beauty of the Las Vegas area by shooting at inanimate objects with REAL lasers! Shoot aliens, robots, barrels and even cacti and try to get the high score. A presentation on how the gallery was conceived and constructed will occur Friday and Saturday at 3 PM in the shooting gallery room. Brought to you by the fine folks from Notacon.

Back to top



Mission SE Impossible

Contest | Location: SE Village
Friday: All day

What is Mission SE Impossible (MSI)? Maybe the best way to describe it is if the Gringo Warrior Challenge had a baby with Ethan Hunt while getting some scotch soaked DNA from the Human Hacker, it would give birth to Mission SE Impossible. Also, this baby could shoot lasers out of it’s eyes.

With lock picking, hand cuffs, laser obstacle course, some ciphers, and safe cracking MSI quickly became extremely popular in the SE Village. Folks of all ages have signed up and competed in this event and are watched by an enthusiastic crowd who is always willing to help out.

More Info: http://www.social-engineer.org/social-engineer-village/, @humanhacker

Back to top



Mohawk-Con

Event | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Mohawk-Con returns for another year of shaving & coloring heads and transforming you into the cool kid at the con. Charitable event to support the EFF & Hackers For Charity, get a cool new hawk in support of the causes that matter to you.

More Info: https://www.facebook.com/MohawkCon/

Back to top



OpenCTF

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

In OpenCTF, teams compete to solve hacking challenges in a wide variety of categories, including web, forensics, programming, cryptography and reverse engineering. There will be challenges for all skill levels. If you've never played in a capture the flag contest before, please feel free to stop by anyway - we'll explain how it works and do what we can to set set up with a team. Optional preregistration, as well as some tips on what to bring and how to prepare, can be found at OpenCTF.com.

You must have at least one team member attending DEFCON to play OpenCTF. Arrangements for non-local players are none of our business or concern.

More Info: Web Page: http://openctf.com, @open_ctf

Back to top



Back to top



Pocket Protector Contest

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Put your pocket protector designs through the ultimate gauntlet designed specifically to measure the usability, security, and style of your pocket protector.

Back to top



Red Alert ICS CTF

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Red Alert ICS CTF is based on ICS test bed (simulation) so all participant can hack actual devices. There are altogether some scenarios with its own set of challenges and scores. Challenges are from Bypass Airgap, ICS protocols and PLC & HMI softwares, Forensics, and Cyber Incidents (including classic and basic challenge, reversing and web).

More Info: http://icssecurity.net/ctf, https://www.facebook.com/nshc.redalert/

Back to top



SE CTF

Contest | Location: SE Village
Friday & Saturday: All Day

The Social Engineering Capture the Flag, SECTF, returns for its 9th year! Contestants have to fight with their own fears to prove they can SE like the best of them.

The flagship social engineering event! The SECTF is a test of bravery AND brains. It pits human against corporate security, in a contest that places the spotlight on the dangers of vishing, all in a 5x5 glass booth for your viewing enjoyment.

More Info: http://www.social-engineer.org/social-engineer-village/, @humanhacker

Back to top



SE CTF Kids

Contest | Location: SE Village
Friday: All Day

The SECTF4Kids has become its own DEF CON event!! What is it?

We have created a series of activities and challenges that will involve things like critical thinking exercises, ciphers, logic puzzles, memory puzzles, verbal and nonverbal challenges, pitting kids against kids in a test of endurance (and fun).

This year’s theme will surely challenge your kids. Ages 6-12.

More Info: http://www.social-engineer.org/social-engineer-village/, @humanhacker

Back to top



SE CTF Teens

Contest | Location: SE Village
Saturday: All Day

We have created a series of activities and challenges that will involve things like critical thinking exercises, ciphers, logic puzzles, memory puzzles, verbal and nonverbal challenges, pitting TEENS against TEENS in a test of endurance (and fun).

This year’s theme will surely challenge your kids. Ages 13-17.

More Info: http://www.social-engineer.org/social-engineer-village/, @humanhacker

Back to top



SOHOpelessly Broken

Contest | Location: Contest Floor
Friday: 10:00 - 19:00, Saturday: 10:00 - 19:00, Sunday: 10:00 - 13:00

SOHOpelessly Broken CTF:
A DEF CON 24 and 25 Black Badge ctf at IoT Village, players compete against one another by exploiting off-the-shelf IoT devices on a segmented network. These 15+ devices all have known vulnerabilities, but to successfully exploit these devices requires lateral thinking, knowledge of networking, and competency in exploit development. CTFs are a great experience to learn more about security and test your skills, so join up in a team (or even by yourself) and compete for fun and prizes! Scan the network to find every device and exploit as many as you can over the weekend. The top three teams will be rewarded!

Zero-Day Contest:
The Zero-Day contest is focused on the discovery and demonstration of new exploits (0-day vulnerabilities). This track relies on the judging of newly discovered attacks against connected embedded electronic devices. Devices that are eligible for the contest can be found at https://www.sohopelesslybroken.com/contests.php#0day and you can start submitting entries now! The winners who score the highest on their judged entries will be rewarded with cash prizes. Contestants will need to provide proof that they disclosed the vulnerability to the vendor.

More Info: http://www.sohopelesslybroken.com, @SOHObroken

Back to top



TeleChallenge

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Let your fingers do the hacking on your touch-tone phone!  Dive into the telephonic world with a challenge that will pit your wits against the complexities of phone systems, and the people and companies that inhabit them.  The TeleChallenge is an immersive environment where all you need to get started is your phone. To win you’ll hack your way into, around, and through a myriad of phone-connected services.  How do you start?  How do you play?  How do you win?  Good questions!  Set sail with the TeleChallenge!

More Info: @telechallenge

Back to top



The Schemaverse Championship

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

The Schemaverse [skee-muh vurs] is a space battleground that lives inside a PostgreSQL database. Mine the hell out of resources and build up your fleet of ships, all while trying to protect your home planet. Once you're ready, head out and conquer the map from other DEF CON rivals.

This unique game gives you direct access to the database that governs the rules. Write SQL queries directly by connecting with any supported PostgreSQL client or use your favourite language to write AI that plays on your behalf. This is DEF CON of course so start working on your SQL Injections - anything goes!

More Info: http://schemaverse.com, @schemaverse

Back to top



Tin Foil Hat Contest

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: Contest Stage 12:00-13:00

What with aliens and the NSA, a hacker can’t always tell who's listening (or who's transmitting...). Show us your skills by building a tin foil hat to shield your subversive thoughts. There are 2 categories: stock, and unlimited. The hat in each category that blocks the most signal will receive the "Substance" award for that category. We all know that hacker culture is all about looking good, though, so a single winner will be selected from all submissions for “Style”. Finally, a single overall winner will be selected from all combined categories for “Style and Substance”.

More Info: http://www.psychoholics.org/tfh, @DC_Tin_Foil_Hat

Back to top



Toxic BBQ

Event | Location: Sunset Park, Pavilion F, (36.0636, -115.1178)
Thursday: 16:00-22:00

The humans of Vegas invite everyone to sear their meat in the searing heat! Kick off the con at Sunset Park, Pavilion F on Thursday afternoon with meat, beer, and conversation at this unofficial welcome party. Burgers and dogs are provided; contribute the rest as you can (more food, drinks, grilling, donations, and rides). This event is off-site, so watch the Info Booth @dcib for carpool times and event updates.

Back to top



The Underhanded Home Automation Contest

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

The Underhanded Home Automation Contest is a nod to the yearly Underhanded C Contest. In spirit it strives for a similar goal; maximum damage from the seemingly innocuous. The contest requires participants to exploit home automation (IoT) devices in novel and arguably detrimental ways.

The rules are simple:
1. Choose one of the selected devices.
2. Devise a novel, subtle, and fiendish way to exploit the device or its operation.
3. Execute your plan, and document your process.
4. Showcase your findings.

A panel of 5 judges will score submissions in a number categories. They include the following: Impact, Underhandedness, Novelty, & Complexity. The top scoring entries win and will be showcased and revered.

More Info: @UnderhandedIoT

Back to top



VulSec Vulnerable Image Building Contest

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

Tired of traditional DefCon events? DefCon attendees have been asked to submit the most devious virtual images for this contest. We have something for every hacker from the most experienced to the wannabe n00bs. VulnSec provides an on-site Cyber Range for contestants to have their images pwned by DefCon attendees. So, bring your hacking tools or use our provided Kali images to participate in this unique “by hackers for hackers” event. Still not interesting enough? Stop by, check our schedule for scheduled time trials and special events. Come out, test your abilities and claim a spot on our scoreboard!

http://vulnsec.net

Back to top



warl0ck gam3z CTF

Contest | Location: Contest Floor
Friday: 10:00-20:00, Saturday: 10:00-20:00, Sunday: 10:00-12:00

warl0ck gam3z CTF is a hands-on 24/7; throw-down, no-holds-barred hacker competition focusing on areas of physical security, digital forensics, hacker challenges and whatever craziness our exploit team develops. This is an online framework so participants can access it regardless of where they are or what network they are connected to via laptop, netbook, tablet or phone.

Most challenges require participants to download something that pertains to the problem at hand and solve the challenge using whatever tools, techniques or methods they have available.There are a multitude of point gainers on and off the game board. Extra point gainers will randomly appear on the game board in the form of The Judge, Bonus Questions, Free Tokens, One Time Tokens, Movie Trivia Quotes, Scavenger Hunts (online and onsite), Lock Picking (onsite) and Flash Challenges. Be careful of the 50/50 Token which may add or subtract points to your score.

The game board contains a scoring area so participants can view current standings, as well as an embedded chat function for those that may want to taunt their competitors, or work with other participants as part of a team. There is always on onsite moderator to assist participants that may be experiencing issues as well.

All events that occur on the game board are sent o to Twitter as they happen. These include items such as participants signing up, leader of the board changes, scoring updates and challenge updates. Additionally, our Facebook site will be populated with information regarding the challenge and the current state of events

More Info: https://twitter.com/gam3z_inc , https://www.facebook.com/Gam3zInc

Back to top



Whose Slide is it anyway?

Contest | Location: Contest Floor

“Whose Slide Is It Anyway?”” is an unholy union of improv comedy, hacking and slide deck sado-masochism.

More Info: @ImprovHacker, https://www.ImprovHacker.com

Wireless CTF

Contest | Location: Wireless Village

The Wireless Village presents the Wireless Capture the Flag (WCTF). We cater to those who are new to this game and those who have been playing for a long time. Each WCTF begins with a presentation on How to WCTF. We also have a resources page on our website that guides participants in their selection of equipment to bring.

More Info: @wctf_us, http://www.wirelessvillage.ninja/wctf.html

Back to top